cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
342
Views
1
Helpful
20
Replies

Stats show malware activity but scans find no threat

proof1st
Level 1
Level 1

I have had OpenDNS set up at my router, working great for a couple years. In the network stats lately I'm noticing what appears to be activity that indicates some malware has infected one of the systems on the network - blocked domains for adware, spam, porn etc. and a surge in requests.

Ive scanned all my systems using avast antivirus free version, malwarebytes, adw cleaner and have found no threats.

What should be my next step in finding the source?

thanks!

20 Replies 20

rotblitz
Level 6
Level 6

No next steps.  This alert message indicates that a DNS lookup happened against a malware domain.  A DNS query for a malware domain does not necessarily mean that you have an infection.  Especially not if there is only one or a few lookups.  You could even create such an alert manually by executing e.g. "nslookup aflesministal.info.".

You may click the red cross to make the alert message at https://dashboard.opendns.com/ disappear and to see if it ever comes up again.

proof1st
Level 1
Level 1

Thnaks  - I hope that's the case! But I am not really getting an alert - just seeing alot of activity that was not there before - see the screenshot of blocked requests below.

 

proof1st
Level 1
Level 1

Looks like the image did not attach - Ill try again.




dnsrequests.GIF

rotblitz
Level 6
Level 6

Well, you said "malware", and these stats do not refer to malware at all.  You must name the things right to get a relevant answer.  Malware is a different settings, not under content filtering, but under security settings at your dashboard.  And nothing with "malware" appears on this picture in your stats.  (It would refer this way.)

Regarding your picture:  These are the domains being blocked by your category settings, not more, not less.  These domains are being looked up during normal web browsing, and they are being blocked by your OpenDNS settings.  So nothing left to do.  You already get what you want to get.  Also, most of those are not domains an AV/threat cleanup program would complain about.

proof1st
Level 1
Level 1
Well I thought I described it well, activity that seems to indicate malware.
The first entry in the screenshot, ib.adnxs.com, which has appeared the most, I thought was potential malware, from Google searching that url.
The activity isn't from normal web browsing, assuming the dates and time stamps are correct. I can confirm no one was accessing the web at the time.
Is it possible that malware of some sort can hijack and forward requests to specific sites?

rotblitz
Level 6
Level 6

"activity that seems to indicate malware."

Adware is not malware - by definition, so actually nothing in your stats indicates malware.

"The first entry in the screenshot, ib.adnxs.com, which has appeared the most, I thought was potential malware, from Google searching that url."

Google doesn't know, and the sources may not really be reliable.  Most of them are simple internet visitors, not really skilled and experienced.
And because the domain is blocked for you, you could not have been able to download any malware (or even adware) from them, so no reason to be worried.  As I said, you already get what you want, and you are protected.

"The activity isn't from normal web browsing, assuming the dates and time stamps are correct. I can confirm no one was accessing the web at the time."

These domains definitely come from normal web browsing, as I know from much experience with OpenDNS stats.  And if you think nobody was browsing at this time, you first should check the time zone for your account to possibly correct it:
https://dashboard.opendns.com/myaccount/timezone
If it was correct, then someone else may have accessed your LAN, e.g. through an unprotected WLAN AP and the likes.

"Is it possible that malware of some sort can hijack and forward requests to specific sites?"

What?  No!  This is not what would make sense.  DNS queries are never ever forwarded to "specific sites", whatever this could mean.  However, malware could raise DNS look-ups with the intent to phone home to download even more malware or to transmit internal information to the outside world.  But as I said, absolutely nothing indicates such behavior in your stats.

proof1st
Level 1
Level 1

Ok thanks for the info. The time zone is correct. I believe my wireless LAN is secure.

Regarding the last point about hijacking - I had heard it described from various sources as similar to this:

"A browser hijacker is a type of malware program that alters your computer's browser settings so that you are redirected to Web sites that you had no intention of visiting."

You're saying something like that is not possibly happening here?

rotblitz
Level 6
Level 6

How would you be able to see something in your stats if this would be hi-jacked and redirected to somewhere else?  This does not make sense, because it would be contradictory by itself.

Also, DNS is not configured in the browser (you should know, because you configured OpenDNS, not in the browser, right?), but this malware "alters your computer's browser settings".  This is again contradictory.

I really do not understand what concerns you have.  You said you saw malware domains in your stats which is simply not true.  And you said you see stats where you haven't been surfing the web which is likely not true either, because you can't obtain the time stamp from the domain stats.  It seems your problem is that you're just too hypersensitive and too diffusely anxious...

Again, I do not see any reason for concerns in your case.  Be happy and live on!  Your pessimism is no good for you.  And I'm leaving this fruitless discussion.

proof1st
Level 1
Level 1

Thanks  for t he help - and the entertainment too! You are quite a trip.

If a malicious program were to hijack the browser and redirect it to another site, yes, that site would show in the dns stats. It would appear as what you are calling "normal" web browsing. Nothing to do with how dns is set up.

And when in chart view, you can see the time of the activity, as in the attached.

Your knowledge is a great resource to this community,  but you appear to know enough to confuse yourself at times. :)

But the free psychoanalysis is much appreciated!




total-req-2014-12_2015-01.GIF

rotblitz
Level 6
Level 6

I didn't intend to continue here, but I will do nevertheless for the sake of clarity.

"If a malicious program were to hijack the browser and redirect it to another site, yes, that site would show in the dns stats."

No, exactly this not.  These threats redirect the browser to a malicious proxy, i.e. the browser's proxy settings are changed unnoticed, and from this point the system's DNS settings (e.g. OpenDNS resolvers) are no longer used, but the DNS configured at the remote proxy server is in effect which is certainly not OpenDNS.  No matter, you'll not see anything of this in your OpenDNS stats then.

"Nothing to do with how dns is set up."

You're right.  This is what I meant by "DNS is not configured in the browser".

"And when in chart view, you can see the time of the activity, as in the attached."

Yes, the overall DNS activity.  You never know what domain name (from your first screen shot) was queried at what time, you only see the total DNS traffic from your second screen shot.  As you traffic is rather large (as from a business, not home), you really do not know what domain was requested at what time.

proof1st
Level 1
Level 1
Excellent, now we are getting somewhere!
Thanks for setting me straight on how redirects work.
You say the traffic is rather large (as from a business, not home), yet this is a home, only 3 adult users, working away from the home during the day. I don't believe we are power users by any means.
Surely this level of activity I'm seeing means something is amiss?


alexahar
Cisco Employee
Cisco Employee

While there is a ton of activity over certain days, the traffic may be generated by visiting very complex websites that contain hundreds of DNS requests to view a couple pages. I'm not seeing anything at the moment that stands out as malicious. Note if you use one of those browser addons to search and verify websites, it's possible that this generates a ton of extra DNS requests. Chrome is also known to generate a ton of extra requests in certain situations as Google search results are pre-cached and loaded without being visited. 

proof1st
Level 1
Level 1
Ok thanks for the info. I'll check out browser add ons. avast anti virus latest update added a plug in to my browser, maybe that's it.

ericsolo1
Level 1
Level 1

I have same issues with unknown requests. I say unknown because on days when no one is home for over 24 hours there is multiple blocked requests flagged as adware,porn,file sharing that no human being on our network could be making. I have verified all wireless devices on my network as well as wired so there is no one accessing our network. These requests cant be "Normal" web browsing and have to be software generated. Are they malware such as botnets generating DNS requests or something the browser is doing I dont' know. The site ib.adnx.com is a pop up virus and I have over 100 requests blocked daily.